BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Vulnerability Roundup: TeamPCP Supply Chain Campaign Widens, AI Framework Flaws, and State-Sponsored Activity

Vulnerability Roundup: TeamPCP Supply Chain Campaign Widens, AI Framework Flaws, and State-Sponsored Activity

March 27, 2026Vulnerabilities & Exploits3 min readcritical

Originally reported by The Hacker News, SANS ISC, MSRC Security Updates

#supply-chain#ransomware#ai-security#state-sponsored#vulnerability-disclosure
Share

TL;DR

A supply chain attack targeting security scanners has expanded beyond initial reports and been added to CISA's Known Exploited Vulnerabilities catalog. Meanwhile, critical vulnerabilities in popular AI frameworks LangChain and LangGraph could expose sensitive data, and state-sponsored groups continue targeted espionage campaigns.

Why critical?

The TeamPCP supply chain campaign has been added to CISA's KEV catalog, indicating confirmed active exploitation of vulnerabilities affecting security tools across multiple organizations.

TeamPCP Supply Chain Campaign Escalates

The TeamPCP supply chain campaign, initially targeting Checkmarx security scanners, has expanded beyond originally reported scope according to SANS ISC researchers. The campaign, which began with initial access on February 28 and culminated in the March 24 LiteLLM PyPI compromise, has now been added to CISA's Known Exploited Vulnerabilities catalog.

Detection tools are now available for organizations to assess their exposure to this campaign that turned security scanners into attack vectors against their own users.

AI Framework Vulnerabilities Expose Critical Data

Security researchers have identified three vulnerabilities in LangChain and LangGraph, widely-used frameworks for building Large Language Model applications. The flaws could allow attackers to access filesystem data, environment secrets, and conversation history from applications built on these platforms.

Given the rapid adoption of AI frameworks in enterprise environments, these vulnerabilities present significant risk to organizations deploying LLM-powered applications without proper security controls.

State-Sponsored Activity Intensifies

China-linked threat group Red Menshen (also known as Earth Bluecrow) has conducted a long-term espionage campaign embedding stealthy BPFDoor implants within telecommunications networks. The strategic positioning allows persistent access to government networks through critical infrastructure compromise.

Separately, pro-Ukrainian group Bearlyfy has targeted over 70 Russian companies since January 2025, deploying custom GenieLocker ransomware as part of their dual-purpose operations aimed at maximum business disruption.

AI Assistant Security Flaw Patched

Anthropic’s Claude Chrome Extension contained a zero-click cross-site scripting vulnerability that allowed malicious websites to inject prompts into the AI assistant without user interaction. Koi Security researcher Oren Yomtov disclosed the flaw, which has since been patched by Anthropic.

Microsoft Security Update Batch

Microsoft has published information for multiple CVEs affecting various components:

  • CVE-2025-66413: Git for Windows NTLM hash leak vulnerability
  • CVE-2026-28753: NGINX ngx_mail_proxy_module vulnerability
  • CVE-2026-3549: ECH parsing heap buffer overflow
  • CVE-2026-33412: Vim command injection via newline in glob()
  • CVE-2026-33228: flatted prototype pollution via parse()
  • CVE-2026-33515: Squid ICP message handling issues
  • CVE-2026-4647: Binutils out-of-bounds read in XCOFF relocation processing

Additional kernel and system-level CVEs were also disclosed, including fixes for btrfs, f2fs, and networking components.

Geopolitical Cyber Warfare Analysis

Security analysts note that rising geopolitical tensions increasingly manifest through cyber operations, with technology itself becoming politicized. The current threat landscape reflects a shift from the post-1945 stability period, with cyber warfare now preceding or reflecting broader geopolitical conflicts.

Sources

  • https://thehackernews.com/2026/03/we-are-at-war.html
  • https://thehackernews.com/2026/03/bearlyfy-hits-70-russian-firms-with.html
  • https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html
  • https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html
  • https://thehackernews.com/2026/03/claude-extension-flaw-enabled-zero.html
  • https://isc.sans.edu/diary/rss/32834
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66413
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28753

Originally reported by The Hacker News, SANS ISC, MSRC Security Updates

Tags

#supply-chain#ransomware#ai-security#state-sponsored#vulnerability-disclosure

Related Intelligence

  • Critical NetScaler Flaw, Supply Chain Attacks, and North Korean VS Code Exploitation

    criticalMar 24, 2026
  • Critical iOS Zero-Day Kit and Cisco FMC Ransomware Attacks Highlight AI Security Gaps

    criticalMar 19, 2026
  • Critical Telnetd RCE, Ubuntu Privilege Escalation, and AI Platform Vulnerabilities Hit Multiple Vendors

    criticalMar 18, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Wiz Launches AI-Powered Cloud Remediation Agent

Next Article

Underground Infrastructure Updates: GRUB Replacement Plot, I2P Performance Analysis, and Tails Domain Fronting→